Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions build/pluto/prometheus/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -13,6 +13,7 @@
./exporters/matrix-synapse.nix
./exporters/nixos.nix
./exporters/node.nix
./exporters/owncast.nix
./exporters/packet-sd.nix
./exporters/packet-spot-market.nix
./exporters/postgresql.nix
Expand Down
7 changes: 7 additions & 0 deletions build/pluto/prometheus/exporters/node.nix
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,13 @@
labels.role = "monitoring";
targets = [ "pluto:9100" ];
}
{
labels.role = "services";
targets = [
"caliban.nixos.org:9100"
"umbriel.nixos.org:9100"
];
}
{
labels.role = "mac";
targets = [
Expand Down
22 changes: 22 additions & 0 deletions build/pluto/prometheus/exporters/owncast.nix
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{ config, ... }:

{
age.secrets.owncast-admin-password = {
file = ../../../secrets/owncast-admin-password.age;
owner = "prometheus";
group = "prometheus";
};

services.prometheus.scrapeConfigs = [
{
job_name = "owncast";
metrics_path = "/api/admin/prometheus";
basic_auth = {
username = "admin";
password_file = config.age.secrets.owncast-admin-password.path;
};
scheme = "https";
static_configs = [ { targets = [ "live.nixos.org:443" ]; } ];
}
];
}
1 change: 1 addition & 0 deletions build/secrets.nix
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,7 @@ let
fastly-read-only-api-token = [ machines.pluto ];
hydra-mirror-aws-credentials = [ machines.pluto ];
hydra-mirror-git-credentials = [ machines.pluto ];
owncast-admin-password = [ machines.pluto ];
packet-sd-env = [ machines.pluto ];
pluto-backup-secret = [ machines.pluto ];
pluto-backup-ssh-key = [ machines.pluto ];
Expand Down
18 changes: 18 additions & 0 deletions build/secrets/owncast-admin-password.age
Original file line number Diff line number Diff line change
@@ -0,0 +1,18 @@
age-encryption.org/v1
-> ssh-ed25519 s9hT2g zQ6WzOL+1nkg75J8o4SCxzvVZi6gYdSkUSCd+f0oUQk
dxItcKGnxUUhzuQWUNs3hmJwPaJF8Rhn4FJbom9tc0A
-> ssh-ed25519 Gr9EaQ USWQtUTQsy1B1p4rGOgdfBYg2ch0fDAxHRA7m6gj9ho
UCA2ExE91+5aMHiRk2OmU4NSPySTzEWtXTpmN/q9RI0
-> ssh-ed25519 3ENwVg 3dpO8ExOR5pr9aIuRjzO7+JEJWCMfDawefoHNcyw0S8
zF9V5KuZU6hiCtxzYDfrZ1tO6dU3HRZtjQz7ihteBG8
-> ssh-rsa MuWD+w
ewDKxmREQzA0Ryc1CfXZ3DnctZ3LjdYhFZuEY97nQdywX4yrijjY/KecNpgI3AKy
yjBdS1cvrlXW5JY40kvwNGnsC2wAL74ccrBBxkPFxbenOTU8xdUBBSXLj3Ad392I
RvepOJBVg4i6JvBKZXfuDVEKijcmuuaa7QGfnnIawhGOu1crltU+SPW48V2ryH1N
xG35dle3FoND9jWoxsf6Ftznyn96pqj1t3g5BJYPvofaO8iqkBQr/zbQjimQm10n
HzIF9S7qf5I8kadvRFPf6nd7nWDCaT0LeSwzc4hA0FzqrfzU0VvM/K/XdO9hFR3N
K3kxQZg43pae4nt5Eqn1iA
-> ssh-ed25519 92bXiA hggcpARKLg5rZ3zufQO/ArpFFd2eEfMdCBvuvjJSOX8
seMbAuoEf5X7tjS2rPfQoBS45Vyy2Im8EBn32zDeJz4
--- Y10ci1xFNmo/Hnf+XctF0uDe82ZLV0yPI9n5qcREOpg
���?/�����Z��m� $j;0��wo-�{��K֛�`A�G\v~�0��I�4��'7�D��d
1 change: 1 addition & 0 deletions non-critical-infra/hosts/caliban.nixos.org/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@
../../modules/element-web.nix
../../modules/matrix-synapse.nix
../../modules/owncast.nix
../../modules/prometheus/node-exporter.nix
../../modules/vaultwarden.nix
./limesurvey-tmp.nix
];
Expand Down
1 change: 1 addition & 0 deletions non-critical-infra/hosts/umbriel.nixos.org/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@
inputs.srvos.nixosModules.hardware-hetzner-cloud-arm
../../modules/common.nix
../../modules/mjolnir.nix
../../modules/prometheus/node-exporter.nix
];

# Bootloader.
Expand Down
8 changes: 8 additions & 0 deletions non-critical-infra/modules/prometheus/node-exporter.nix
Original file line number Diff line number Diff line change
@@ -0,0 +1,8 @@
{
networking.firewall.allowedTCPPorts = [ 9100 ];

services.prometheus.exporters.node = {
enable = true;
enabledCollectors = [ "systemd" ];
};
}